论文标题
物联网的治理(物联网)
Governance of the Internet of Things (IoT)
论文作者
论文摘要
当今的技术变革速度的提高是由于计算机处理速度的快速增长,加上处理能力的成本下降,并且是历史进口的。在过去的几年中,全球数十亿个人的日常生活已被技术永远改变。昂贵的数据泄露以惊人的速度继续。人类试图管理人工智能,机器学习以及与互联网连接的数十亿感觉设备的影响时面临的挑战是本文的主题。 我们在九个部分中进行。首先,我们定义物联网(IoT),评论连接到Internet的感官设备的爆炸性增长,提供物联网设备的示例,并谈到物联网的承诺。其次,我们讨论了公司治理的法律要求,以此作为考虑管理物联网挑战的基础。第三,我们研究潜在的物联网威胁。第四,我们讨论Mirai僵尸网络。第五,是危机时期的物联网威胁向量脆弱性。第六,我们讨论了制造的用法描述(MUD)方法。第七,是对最近的监管发展的讨论。接下来,我们查看一些建议。最后,我们得出结论。我们认为,这篇文章有助于我们理解与物联网相关的恶意软件的广泛接触,并增加了有关企业风险治理的新生但新兴的文献,这是一个至关重要的社会重要性的主题。
Today's increasing rate of technological change results from the rapid growth in computer processing speed, when combined with the cost decline of processing capacity, and is of historical import. The daily life of billions of individuals worldwide has been forever changed by technology in just the last few years. Costly data breaches continue at an alarming rate. The challenge facing humans as they attempt to govern the process of artificial intelligence, machine learning, and the impact of billions of sensory devices connected to the Internet is the subject of this Article. We proceed in nine sections. First, we define the Internet of Things (IoT), comment on the explosive growth in sensory devices connected to the Internet, provide examples of IoT devices, and speak to the promise of the IoT. Second, we discuss legal requirements for corporate governance as a foundation for considering the challenge of governing the IoT. Third, we look at potential IoT threats. Fourth, we discuss the Mirai botnet. Fifth, is a look at the IoT threat vector vulnerabilities during times of crisis. Sixth, we discuss the Manufactured Usage Description (MUD) methodology. Seventh, is a discussion of recent regulatory developments. Next, we look at a few recommendations. And finally, we conclude. We believe this Article contributes to our understanding of the widespread exposure to malware associated with IoT and adds to the nascent but emerging literature on governance of enterprise risk, a subject of vital societal importance.